CN1131992A - Security system for software - Google Patents

Security system for software Download PDF

Info

Publication number
CN1131992A
CN1131992A CN95190768A CN95190768A CN1131992A CN 1131992 A CN1131992 A CN 1131992A CN 95190768 A CN95190768 A CN 95190768A CN 95190768 A CN95190768 A CN 95190768A CN 1131992 A CN1131992 A CN 1131992A
Authority
CN
China
Prior art keywords
key
program
software
encrypted
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN95190768A
Other languages
Chinese (zh)
Inventor
渡边晋一郎
久林靖孝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advance KK
Advance Co Ltd
Original Assignee
Advance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advance Co Ltd filed Critical Advance Co Ltd
Publication of CN1131992A publication Critical patent/CN1131992A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/123Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2211/00Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
    • G06F2211/007Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress

Abstract

The invention provides a security system for software, which permits only the authorized people to use the software by a simple operation and gives an alarm if the software is found to be infected by a virus. In this system, a software supply portion prepares to supply a program as the supply object to a center portion and to a user portion. The center portion generates a conversion program by applying predetermined conversion to the program supplied thereto, and prepares to supply the converted program to the user portion. The user portion applies a predetermined conversion to the program so as to generate a converted program, compares this converted program with the converted program supplied from the center portion, and executes the program only when both are found coincident as a result of comparison.

Description

Security system for software
Technical field
The present invention relates to a security system for software.Can be used for protection such as application software, operating system or the like according to system of the present invention, and can protect these softwares not to be subjected to the infection of software virus.
Technical background
Illegal copies application program, operating system software and utility routine are problems that has certain ubiquity without permission.Do not find also that before this a kind of good method stops this illegal copies behavior, do not have a kind of gratifying approach to protect software to exempt from the invasion and attack of the virus of some calculated attack and destruction software yet.Therefore, be necessary to seek a kind of method and approach of suitable protection software.
Summary of the invention
Purpose of the present invention will realize a kind of security system for software exactly.In this system, have only user just can operate to software through authorizing, other users then can not use this software, and the illegal change that can detect this software gives the alarm simultaneously.
According to the present invention, a kind of system of the protection software of being made up of following three parts can be provided: the software vendor part is prepared as software administration core and User Part at any time program is provided; The software administration core partly links to each other with above-mentioned software vendor, the program that provides is provided in the intended manner and is prepared at any time this program through conversion is offered User Part; User Part, during service routine, link to each other with the software administration core with above-mentioned software vendor part, the program that provides is provided in the intended manner, and this is passed through program of changing compare with the above-mentioned program through conversion that is provided by the software administration center, just go to carry out this program when having only the two identical.
Simultaneously, according to the present invention, also can provide a kind of system of the protection software of forming by following three parts: the software vendor part, use first key that program is encrypted and obtain one through encrypted program, re-use second key and first key is encrypted first key that obtains through encrypting, then this is offered the software administration core through encrypted program, and prepare at any time this is offered User Part through encrypted program with through first key of encrypting; The software administration core, partly link to each other with above-mentioned software vendor, the process encrypted program that provides is converted to one through conversion and encrypted program, use the 3rd key that the program of this process conversion is encrypted the program through encryption and conversion that obtains then, re-use the 4th key the 3rd key is encrypted the 3rd key that obtains through encrypting, and prepare at any time this is offered User Part through the program of encryption and conversion and through the 3rd key of encrypting; User Part, during service routine, link to each other with the software administration core with above-mentioned software vendor part, in the intended manner to be converted to program through encrypted program through conversion, use the 5th key to being decrypted the 3rd key that obtains Xie Liaomi then through the 3rd key of encrypting, re-use the 3rd key to be decrypted the program that obtains Xie Liaomi through the program of encrypting and change through conversion, this has been separated the close program through conversion compares with above-mentioned program through conversion, have only and when the two is identical, just use the 6th secret key decryption first key, use this first key to go to decipher and carry out this program then.
Brief description
Fig. 1 is the Information Processing Network figure that security system for software was suitable for of a certain embodiment according to the present invention.
Fig. 2 is the Information Processing Network figure that security system for software was suitable for according to another embodiment of the present invention.
Implement best mode of the present invention
According to the Information Processing Network figure that security system for software was suitable for of a certain embodiment of the present invention as shown in Figure 1.A software house 1 is provided in this network chart, i.e. software vendor part is comprising encryption device 11 and 12.In software house 1, use key K that all or part of of program P encrypted, obtain through encrypted program P1.Wherein, key K is specific to program P.Through encrypted program P1 is inexecutable.To register to software administration center 2 through encrypted program P1.
According to the request from User Part 3, this user has bought through encrypted program P1, uses user's public-key cryptography P (u) that key K is encrypted, and obtains then this key K 1 being sent to User Part 3 through encrypted secret key K1.
Software administration core 2 provides conversion equipment 21 and encryption device 22 and 23.In software administration core 2, at first use a kind of hash function that the process encrypted program P1 by software house 1 registration is compressed, obtain through overcompression and encrypted program P2, then use this is encrypted through overcompression and encrypted program P2 specific to the key r of program P1, obtain program P3 through encrypting and compressing, use the privacy key S (sc) of software administration core 2 that key r is encrypted then, obtain through encrypted secret key r1.Because through encrypted secret key r1 and through encrypting and the program P3 of compression can obtain under the situation of designated user not in advance, so they can leave in the same storage medium with the process encrypted program P1 that is sold by software house 1.
In User Part 3, when buying program or after the purchase program, the request of sending the announcement of purchase program and obtaining key to software house 1.The process encrypted secret key K1 that is sent by software house is as the input of install software.In User Part 3, come executive routine by using load software and information carrier equipment 31.Equipment 31 is devices that are connected on the program execution apparatus 32.Storer that also has keyboard display device, hard disk and disk one class that may connect on the program execution apparatus 32 or the like and input-output apparatus.
In equipment 31, decryption device 311,312,315 and 316 is arranged, conversion equipment 314, and compare facilities 317.31 li authentication procedures that comprise privacy key, decrypted program and user of equipment.Equipment 31 can will be used in combination with 32 mouthfuls of LPTs on the personal computer of its executive routine, RS2 etc. with the user, so that carry out such as K1, P1, r1 and the decryption work of P3 one class data and the verification process of program.Equipment 31 can be, for example, and the IC-card that a slice can link to each other with personal computer.
Encryption device 11,12,22 and 23 can be by data encryption standards (DES), rapid data cryptographic algorithm (FEAL) formations such as (registered trademarks), but needn't only be confined to these examples.These encryption devices can be same types, also can be dissimilar.The all its corresponding encryption device of in the decryption device 311,312,315 and 316 each occurs in pairs.These decryption devices can be made up of the decipherment algorithm of data encryption standards (DES), rapid data cryptographic algorithm (FEAL) etc., but needn't only be confined to these examples.
Privacy key S (u) and P (sc) are by the mode in the storer of its write device 31 is offered User Part in advance.Use the conversion equipment of hash function can be included in the equipment 31, perhaps also can with conversion equipment as an algorithm stores in the storage medium of program execution apparatus 32.Can with the process encrypted program P1 that partly provides by software vendor partly or entirely with through the specific key K 1 of encrypting, together with process the encrypted secret key r that provides by the software administration core with through encrypting and the program P2 of compression leaves in disk, random access storage device RAM, read only memory ROM and the photomagneto disk in the program execution apparatus so that in program execution apparatus the main processing procedure of execution.
Use the method for the key of enciphered message can preferably adopt open key system and cipher key pre-distribution system (KPS).In open key system, generated public-key cryptography, open file and the privacy key relevant in advance with the disclosure key, public-key cryptography is single distribution, privacy key is secret management.The generation of public-key cryptography, the open file relevant and privacy key and distribute and mainly finish by the operation of software administration core with the disclosure key.But, also can not be subjected to the restriction of this mode and cooperate to finish this work by User Part, software vendor part or the two.The method that generates the particular content of each public-key cryptography and privacy key is externally disclosed.
In cipher key pre-distribution system (KPS), the opposing party's identifier is applied to the distinctive secret algorithm of party of one's own generates the key that the opposing party is common.The operation of generation such as secret algorithm mainly carried out in the software administration core.The software administration core has the CENTER ALGORITHM of oneself separately.Identifier by application software and software vendor part can generate specific secret algorithm.
About the method that generates CENTER ALGORITHM, the method that generates secret algorithm, the method that generates common encryption key and the definition of mechanism and identifier can be found in the document of announcing such as Japanese laid-open patent 63-36634 number and 63-107667 number.
The operation of software administration core can be finished in User Part, software vendor part or the two cooperation.Use the said method of above-mentioned key preferentially to select for use, but needn't only be confined to this.For cryptographic algorithm, can adopt the algorithm such as data encryption standards method (DES), rapid data cryptographic algorithm (FEAL) (registered trademark).
Handled software can be application program, operating system program, utility routine or the like in the network chart shown in Figure 1.Software vendor part in the network chart shown in Figure 1 (mechanism that supplies with user software) adopts the form of retail shop, as software house, relevant manufacturer, retail shop, stand, the software of supplying with another software or equipment or the like, provide software for User Part with compensation or gratis.The software vendor part can be incorporated software administration core or User Part into.If software vendor partly is in the position of using a software, the software vendor part can be set at User Part so.User Part in the network chart shown in Figure 1 with such as user self, by the software that the user was had drive its equipment of finishing program implementation, connect the equipment to the there, form such as software self occurs.
To tell about the operation in the network chart shown in Figure 1 below.The precondition of operation is: (1) User Part has a station information vehicle equipment that comprises himself privacy key; (2) if the user is unwarranted user, target program will not worked; (3) can freely back up; (4) processing of virus problems can be carried out the improper modification of data by checking.
In operation, at first, the cryptographic algorithm of using DES one class to partly or entirely the encrypting of the program P that sends to User Part 3 from software vendor part 1, obtains passing through encrypted program P1 with specific key K.Then, to this process encrypted program of software administration core 2 registrations P1.
In part 2, use certain hash function to compressing through encrypted program P1, obtain through overcompression and encrypted program P2, this program, is encrypted as DES by certain cryptographic algorithm, obtains the program P3 through encrypting and compressing.By the privacy key S (sc) that uses software administration core 2 key r is encrypted.
When receiving P1, r1 and P3 or afterwards, User Part 3 is to this reception incident of software vendor part 1 untill further notice.In the software vendor part, the public-key cryptography P (u) by using User Part encrypts the specific key K of program, obtains and will send to the process encrypted secret key K of User Part.At User Part, finish the installation of K1, P1, r1 and P3 by using special-purpose install software.
At User Part 3, when each program is carried out, be decrypted by using 31 couples of P1 of information carrier equipment by load software, obtain program P1, by using hash function the program of this process deciphering is changed, obtain program P2 through overcompression.By the public-key cryptography P (sc) that uses software administration core 2 r1 is decrypted, obtains r, use this r that P3 is decrypted then, obtain program P2 through deciphering.This program P2 and program P2 through overcompression above-mentioned through deciphering is compared so that can whether pass through improper modification by scrutiny program P1.If be checked through improper modification, then may give the alarm.
The identity with User Part 3 is not relevant with compress algorithm P3 because through algorithm P1, the process encrypted secret key r1 of encryption and through encrypting, so it is identical that they can generate in advance, both can send also and can send from software vendor part 1 from software administration core 2.
The information carrier equipment 31 that links to each other with program execution apparatus 32 preferably size is little, in light weight, has the little shape that takes up room.In addition, also can provide information carrier equipment, and finish all operations by program execution apparatus itself.
According to the Information Processing Network figure that security system for software was suitable for of another embodiment of the present invention as shown in Figure 2.Provide a software house 1 as the software vendor part in this network chart, comprising encryption device 11 and 12 and key generation device 13.In software house 1, use key K that all or part of of program P encrypted, obtain through encrypted program P1.Wherein, key K is specific to program P.Through encrypted program P1 is inexecutable.To register to software administration center 2 through encrypted program P1.
According to request from User Part 3, this user has bought through encrypted program P1, generate the common encryption key K (SIA) of cipher key pre-distribution system (KPS) by the identifier A that uses User Part, with K (SIA) key K is encrypted generation K1, then this is sent to User Part 3 through encrypted secret key K1.
Software administration core 2 provides conversion equipment 21, encryption device 22 and 23 and key generation device 24.In part 2, at first use certain hash function that the process encrypted program P1 by software house 1 registration is compressed, obtain through overcompression and encrypted program P2, then use P2 is encrypted specific to key r through encrypted program P1, obtain program P3 through encrypting and compressing, use software vendor part or software and the public encryption key K (SIA) of User Part that key r is encrypted then, obtain through encrypted secret key r1.Because P3 can generate under the situation of designated user not in advance, so P3 can leave in the same storage medium with the process encrypted program P1 that is sold by software house 1.At software administration core 2, the secret algorithm that is had by the software vendor part both can be deposited in the there in advance, also can follow-uply install again.From this respect, this specific algorithm can be had by software administration central part branch.In this case, when the software after compressing etc. will send to User Part, can in the secret algorithm of software administration core, use the identifier of User Part to generate this key, and in the secret algorithm of User Part, use the identifier of software administration core to generate this key.
In User Part 3, when service routine or after the purchase program, the announcement of partly sending the purchase program to software vendor is as the request that requires to send key.In User Part 3, the process encrypted secret key K1 that software vendor part 1 is sent is input in the install software, and program implementation is to be finished with the information carrier equipment 31 that links to each other with program execution apparatus 32 by the loading procedure that install software generated by using.Information carrier equipment 31 links to each other with program execution apparatus 32.The equipment that connects on the program execution apparatus 32 has keyboard, display device, harddisk memory, disk, input-output apparatus.In User Part 3, the identifier S (I) of software vendor part offers key generation device 313.
In information carrier equipment 31, comprise the authentication procedure of privacy key, decrypted program and User Part.Information carrier equipment 31 is suitable for will linking to each other with the LPT on the personal computer of its executive routine, RS232C mouth etc. with the user, so that carry out K1, P1, r1 and the decryption work of P3 one class data and the verification process of program.RS232C is the standard of a relevant interface being issued by EIA.
Encryption device 11,12,22 and 23 cryptographic algorithm by data encryption standards method (DES), rapid data cryptographic algorithm (FEAL) (registered trademark) etc. in the network chart of Fig. 2 are formed, but needn't only be confined to this.These encryption devices can be same types, also can be dissimilar.The all its corresponding encryption device of in the decryption device 311,312,315 and 316 each occurs in pairs.These decryption devices can be made up of the decipherment algorithm of data encryption standards (DES), rapid data cryptographic algorithm (FEAL) etc., but needn't only be confined to these examples.
Secret algorithm offers User Part in advance, and in the storer of writing information vehicle equipment 31.The conversion equipment of being made up of hash function that User Part had can be included in the information carrier equipment in advance, also can be used as algorithm and leaves in the storer of program execution apparatus.
The process encrypted program P1 that software vendor part 1 can be provided partly or entirely and process the encrypted secret key r1 that provides through the specific key K 1 of encrypting, together with software administration core 2 and through encrypting and the program P3 of compression leaves in disk, random access storage device RAM, read only memory ROM and the photomagneto disk in the program execution apparatus, and in program execution apparatus the main processing procedure of execution.The identifier A of software vendor part and the employed software of User Part can leave in the same storage medium with the process encrypted program P1 that software house is sold.
To tell about the operation in the network chart shown in Figure 2 below.The precondition of operation is: (1) User Part has a station information vehicle equipment that comprises himself privacy key; (2) if the user is unwarranted user, target program will not worked; (3) can freely back up; (4) processing of virus problems can be carried out the improper modification of data by checking.
In operation, at first, the cryptographic algorithm of using DES one class in advance to partly or entirely the encrypting of the program P that sends to User Part 3 from software vendor part 1, obtains passing through encrypted program P1 with specific key K.Then, to this process encrypted program of software administration core 2 registrations P1.
In part 2, use certain hash function to compressing through encrypted program P1, obtain through overcompression and encrypted program P2, this program, is encrypted as DES by certain cryptographic algorithm, obtains the program P3 through encrypting and compressing.Key r is encrypted by software vendor part or software and the public encryption key K (SIA) of User Part, obtains through encrypted secret key r1.
When receiving P1, r1 and P3 or afterwards, User Part 3 is to this reception incident of software vendor part 1 untill further notice.
In the software vendor part, by using the public encryption key K (SIA) of software vendor part or software and User Part the specific key K of program is encrypted, obtain and will send to the process encrypted secret key K1 of User Part.At User Part, finish the installation of K1, P1, r1 and P3 by using special-purpose install software.
At User Part 3, when each program is carried out, be decrypted by using 31 couples of P1 of information carrier equipment by load software, obtain program P1, by using hash function the program of this process deciphering is changed, obtain program P2 through overcompression.By using software vendor part or software and the public key K (SIA) of User Part that r1 is decrypted, obtain r, use r that P3 is decrypted then, obtain program P2 through deciphering.This program P2 and program P2 through overcompression above-mentioned through deciphering is compared so that can whether pass through improper modification by determining program P1.If be checked through a certain improper modification, then may give the alarm.
Because the identity with User Part 3 is not relevant with compress algorithm P3 through the algorithm P1 that encrypts and through encrypting,, both can sends also and can send from software vendor part 1 from software administration core 2 so that they can generate in advance is identical.
The information carrier equipment 31 that links to each other with program execution apparatus 32 preferably size is little, in light weight, has the little shape that takes up room.In addition, also can provide information carrier equipment, and finish all operations by program execution apparatus itself.
So far as can be seen, in Information Processing Network figure illustrated in figures 1 and 2, have only the user through authorizing just can operate software, other users then can not use this software, and can detect virus the illegal change of this software is given the alarm simultaneously.

Claims (10)

  1. One the protection software system, comprising: the software vendor part is prepared as software administration core and User Part at any time program is provided; The software administration core partly links to each other with above-mentioned software vendor, the program that is provided is provided in the intended manner and is prepared at any time this program through conversion is offered User Part; User Part, link to each other with the software administration core with above-mentioned software vendor part, the program that is provided is provided in the intended manner, and this is passed through program of changing compare with the above-mentioned program through conversion that is provided by the software administration center, just go to carry out this program when having only the two identical.
  2. 2. according to the system of claim 1, wherein, program will be encrypted, and, when the User Part decision procedure can be carried out, be to being decrypted through encrypted program.
  3. 3. according to the system of claim 1, wherein, to encrypt to the program that User Part provides through conversion by the software administration core, and, when User Part uses this program, be decrypted at least the process encrypted program.
  4. 4. according to the system of claim 2, wherein,, use based on public documents or from the key of user's request program is encrypted in the software vendor part, and, at User Part, use privacy key to being decrypted through encrypted program.
  5. 5. according to the system of claim 3, wherein, at the software administration core, the privacy key that uses the software administration core is to encrypting through the program of conversion, and at User Part, the public-key cryptography that uses the software administration core is to being decrypted through encrypted program.
  6. 6. according to the system of claim 2, wherein, in the software vendor part, use the public key of User Part that program is encrypted, this key is to generate at user application identifier partly in the secret algorithm of software or software vendor part, and, at User Part, the key that uses software or software vendor partial common is to being decrypted through encrypted program, and this key is to generate at the identifier partly of application software or software vendor in the secret algorithm of User Part.
  7. 7. according to the system of claim 3, wherein, at the software administration core, the key that uses User Part and software or software vendor partial common is to encrypting through the program of conversion, this key is to generate at user application identifier partly in the secret algorithm of software or software vendor part, and, at User Part, the key that uses software or software vendor partial common is to being decrypted through the program of encrypting and change, and this key is to generate at the identifier partly of Application Software Provider in the secret algorithm of User Part.
  8. One the protection software system, comprise: the software vendor part, use first key that program is encrypted and obtain one through encrypted program, re-use second key and first key is encrypted first key that obtains through encrypting, then this is offered the software administration core through encrypted program, and prepare at any time this is offered User Part through encrypted program with through first key of encrypting; The software administration core, partly link to each other with above-mentioned software vendor, the process encrypted program that provides is converted to one through conversion and encrypted program, use the 3rd key that the program of this process conversion is encrypted the program through encryption and conversion that obtains then, re-use the 4th key the 3rd key is encrypted the 3rd key that obtains through encrypting, and prepare at any time this is offered User Part through the program of encryption and conversion and through the 3rd key of encrypting; User Part, link to each other with the software administration core with above-mentioned software vendor part, during service routine, in the intended manner to be converted to program through encrypted program through conversion, use the 5th key to being decrypted the 3rd key that obtains Xie Liaomi then through the 3rd key of encrypting, re-use the 3rd key to be decrypted the program that obtains Xie Liaomi through the program of encrypting and change through conversion, this has been separated the close program through conversion compares with above-mentioned program through conversion, have only and when the two is identical, just use the 6th secret key decryption first key, use this first key to go to decipher and carry out this program then.
  9. 9. system according to Claim 8, wherein, second key is the public-key cryptography of User Part, and the 6th key is the privacy key of User Part, the 4th key is the privacy key of software administration core, and the 5th key is the public-key cryptography of software administration core.
  10. 10. system according to Claim 8, wherein, second key is the public key of User Part, this key is that the identifier of user application part in the secret algorithm of software or software vendor part generates, the the 5th and the 6th key is the key of software or software vendor partial common, this key is that the identifier of application software or software vendor part in the secret algorithm of User Part generates, the 4th key is the public key of User Part, and this key is that the identifier of user application part in the secret algorithm of software that software administration central part branch has or software vendor part generates.
CN95190768A 1994-07-05 1995-07-05 Security system for software Pending CN1131992A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP6174933A JPH0822390A (en) 1994-07-05 1994-07-05 System for defensing software
JP174933/94 1994-07-05

Publications (1)

Publication Number Publication Date
CN1131992A true CN1131992A (en) 1996-09-25

Family

ID=15987267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN95190768A Pending CN1131992A (en) 1994-07-05 1995-07-05 Security system for software

Country Status (5)

Country Link
EP (1) EP0718756A4 (en)
JP (1) JPH0822390A (en)
KR (1) KR960705270A (en)
CN (1) CN1131992A (en)
WO (1) WO1996001450A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1300697C (en) * 2003-09-15 2007-02-14 英业达股份有限公司 Software pretection method and system
CN1323350C (en) * 2002-07-24 2007-06-27 松下电器产业株式会社 Program development method, program development support device and mounting method
US7539312B2 (en) 2002-11-15 2009-05-26 Panasonic Corporation Program update method and server
CN102136049A (en) * 2011-04-01 2011-07-27 奇智软件(北京)有限公司 Terminal application safety management method and system
CN105372690A (en) * 2015-11-21 2016-03-02 广西南宁至简至凡科技咨询有限公司 GPS and inertial measurement unit-based train combined positioning system

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10133955A (en) * 1996-10-29 1998-05-22 Matsushita Electric Ind Co Ltd Portable medium driving device, its method, cooperative device of portable medium and network, and its method
FR2758898B1 (en) * 1997-01-28 1999-03-05 Sagem METHOD FOR PRESERVING SOFTWARE DATA INTEGRITY
JPH10301773A (en) * 1997-04-30 1998-11-13 Sony Corp Information processor and method therefor and recording medium
EP1607821A1 (en) * 2004-06-17 2005-12-21 Nagracard S.A. Method for secure software upgrade in a security module
KR100767423B1 (en) * 2006-08-18 2007-10-17 엘지전자 주식회사 Copyright protection method and apparatus for multimedia transmission system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
JPS6336634A (en) * 1986-07-31 1988-02-17 Advance Co Ltd Cryptographic key common use system and equipment using same system
JP2980320B2 (en) * 1986-10-24 1999-11-22 株式会社 アドバンス Encryption key sharing method in ciphertext communication system
JP2886969B2 (en) * 1990-10-29 1999-04-26 株式会社日立製作所 Program conversion method
US5103476A (en) * 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
JPH04238536A (en) * 1991-01-22 1992-08-26 Nec Software Ltd Illegal alteration preventing device for execution form file
JPH04338823A (en) * 1991-05-16 1992-11-26 N T T Data Tsushin Kk Detecting method for illicit alteration of soft module using ic card
JPH05173892A (en) * 1991-12-26 1993-07-13 Nec Corp File loading system
US5291598A (en) * 1992-04-07 1994-03-01 Gregory Grundy Method and system for decentralized manufacture of copy-controlled software
US5343527A (en) * 1993-10-27 1994-08-30 International Business Machines Corporation Hybrid encryption method and system for protecting reusable software components

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1323350C (en) * 2002-07-24 2007-06-27 松下电器产业株式会社 Program development method, program development support device and mounting method
US8190912B2 (en) 2002-07-24 2012-05-29 Panasonic Corporation Program development method, program development supporting system, and program installation method
US7539312B2 (en) 2002-11-15 2009-05-26 Panasonic Corporation Program update method and server
US7546468B2 (en) 2002-11-15 2009-06-09 Panasonic Corporation Program update method and server
US7849331B2 (en) 2002-11-15 2010-12-07 Panasonic Corporation Program update method and server
CN1300697C (en) * 2003-09-15 2007-02-14 英业达股份有限公司 Software pretection method and system
CN102136049A (en) * 2011-04-01 2011-07-27 奇智软件(北京)有限公司 Terminal application safety management method and system
CN102136049B (en) * 2011-04-01 2013-04-24 奇智软件(北京)有限公司 Terminal application safety management method and system
CN103136478A (en) * 2011-04-01 2013-06-05 北京奇虎科技有限公司 Terminal application safety management method and system
CN103136478B (en) * 2011-04-01 2016-04-06 北京奇虎科技有限公司 A kind of method for managing security of terminal applies and system
CN105372690A (en) * 2015-11-21 2016-03-02 广西南宁至简至凡科技咨询有限公司 GPS and inertial measurement unit-based train combined positioning system

Also Published As

Publication number Publication date
WO1996001450A1 (en) 1996-01-18
JPH0822390A (en) 1996-01-23
KR960705270A (en) 1996-10-09
EP0718756A4 (en) 1996-11-06
EP0718756A1 (en) 1996-06-26

Similar Documents

Publication Publication Date Title
EP0773490B1 (en) Security system for protecting information stored in storage media
EP0809244B1 (en) Software copying system
US7802112B2 (en) Information processing apparatus with security module
US5901227A (en) Method and apparatus for implementing partial and complete optional key escrow
US5548721A (en) Method of conducting secure operations on an uncontrolled network
CN105681039B (en) Method and device for generating a secret key and corresponding decryption
US6976167B2 (en) Cryptography-based tamper-resistant software design mechanism
CN112150147A (en) Data security storage system based on block chain
WO2012124270A1 (en) Tamper monitoring system, administration device, protection control module, and sensor module
CN1985466A (en) Method of delivering direct proof private keys in signed groups to devices using a distribution CD
JP2009501470A (en) Protecting multimedia data
CN111815814B (en) Electronic lock security system and binding authentication method thereof
CN111954211B (en) Novel authentication key negotiation system of mobile terminal
CN111815812B (en) Third-party unlocking control method and system for electronic lock
CN111639306A (en) Offline software authorization method, device, equipment and storage medium
CN1131992A (en) Security system for software
JPH08320847A (en) Password management system
CN101730886B (en) Secure storage system and method of use
EP0843439B1 (en) Data encryption technique
CN1559026A (en) Method and apparatus for protecting information from unauthorised use
CA2529064A1 (en) System and method for controlling usage of software on computing devices
CN114785527B (en) Data transmission method, device, equipment and storage medium
CN114692097A (en) Off-line software use authorization method
CN115022042A (en) Compliance code verification method for protecting data privacy and computer readable medium
US7925890B2 (en) Network centered recovery process for cryptographic processing modules

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C01 Deemed withdrawal of patent application (patent law 1993)
WD01 Invention patent application deemed withdrawn after publication